This security advisory describes one medium risk vulnerability.
The vulnerability allows a remote attacker to bypass authentication on an affected device.
The vulnerability exists due to missing authentication on some of the API calls. A remote attacker can send a specially crafted request to one of the affected calls and interact with some parts of the API.Mitigation
Install updates from vendor's website.Vulnerable software versions
Cisco Vision Dynamic Signage Director: 2.0, 2.4, 3.0, 3.1, 3.2, 4.0, 4.1, 5.0, 5.0sp9, 6.0, 6.1, 6.1sp3, 6.2CPE
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.